Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard[citation needed]: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1997, which was superseded in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.1X.

The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Hackers had not yet had time to latch on to the new technology, and wireless networks were not commonly found in the work place. However, there are many security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Hacking methods have become much more sophisticated and innovative with wireless access. Hacking has also become much easier and more accessible with easy-to-use Windows- or Linux-based tools being made available on the web at no charge.

If an employee (trusted entity) brings in a wireless router and plugs it into an unsecured switchport, the entire network can be exposed to anyone within range of the signals. Similarly, if an employee adds a wireless interface to a networked computer using an open USB port, they may create a breach in network security that would allow access to confidential materials. However, there are effective countermeasures (like disabling open switchports during switch configuration and VLAN configuration to limit network access) that are available to protect both the network and the information it contains, but such countermeasures must be applied uniformly to all network devices.

Wireless security is nothing but protecting computers, smartphones, tablets, laptops and other portable devices along with the networks they are connected to, from threats and vulnerabilities associated with wireless computing. This is an introductory course that covers the basics of Wireless Security and how to deal with its various modules and sub-modules.

Course Curriculum

  • 1

    Wireless Security Basic

    • Wireless Security - Concepts

      FREE PREVIEW
    • Wireless Security - Access Point

    • Wireless Security - Network

    • Wireless Security - Standards

    • Wireless Security Wi-Fi Authentication Modes

    • Wireless Security - Encryption

    • Wireless Security - Break an Encryption

  • 2

    Wireless Threats

    • Wireless Security - Access Control Attacks

    • Wireless Security - Integrity Attacks

    • Wireless Security - Confidentiality Attacks

    • Wireless Security - DoS Attack

    • Wireless Security - Layer 1 DoS

    • Wireless Security - Layer 2 DoS

    • Wireless Security - Layer 3 DoS

    • Wireless Security - Authentication Attacks

    • Rogue Access Point Attacks

    • Wireless Security - Client Misassociation

    • Misconfigured Access Point Attack

    • Ad-Hoc Connection Attack

    • Wireless Security - Hacking Methodology

    • Wireless Security - Traffic Analysis

    • Wireless Security - Launch Wireless Attacks

    • Wireless Security - Crack Wireless Attacks

  • 3

    Wireless Security Tools

    • Wireless Security - RF Monitoring Tools

    • Wireless Security - Bluetooth Hacking

    • Wireless Security - Bluetooth Stack

    • Wireless Security - Bluetooth Threats

    • Wireless Security - Bluetooth Hacking Tools

    • Wireless Security - Bluejack a Victim

    • Wireless Security - Tools

  • 4

    Wireless Security Pen Testing

    • Wireless Security - Wi-Fi Pen Testing

    • Pentesting Unencrypted WLAN

    • Wireless Security - WEP Encrypted WLAN

    • Pentesting WPA/WPA2 Encrypted WLAN

    • Pentesting LEAP Encrypted WLAN

You may also be interested in...

  • £600.00

    £600.00Certificate in Mobile Security

    Buy Now
  • £600.00

    £600.00Certificate in Computer Security

    Buy Now
  • £600.00

    £600.00Certificate in Cyber Security

    Buy Now
  • £600.00

    £600.00Certificate in Network Security

    Buy Now